MAC and Logical addressing (A Review Study)

Size: px
Start display at page:

Download "MAC and Logical addressing (A Review Study)"

Transcription

1 Umang Garg, Pushpneel Verma, Yudhveer Singh Moudgil, Sanjeev Sharma / International Journal of MAC and Logical addressing (A Review Study) Umang Garg 1, Pushpneel Verma 2, Yudhveer Singh Moudgil 3, Sanjeev Sharma 4, Department of Computer Science & Engineering 1,3,4 Uttaranchal Institute of Technology, Arcadia Grant, P.O. Chandanwari PremNagar,Dehradun,Uttarakhand. 2 Bhagwant Institute of Technology, Bhagwantpuram, Muzaffarnagar ABSTRACT Networking is the vast growing technology in our culture today. One of the technologies is Internet Protocol. It is the main network protocol in the Internet model (TCP/IP). The success of TCP/IP as the network protocol of the Internet is largely because of its ability to connect together networks of different sizes and systems of different types. These networks are arbitrarily defined into three main classes (along with a few others) that have predefined sizes, each of which can be divided into smaller subnet works by system administrators. A subnet mask is used to divide an IP address into two parts. One part identifies the host (computer), the other part identifies the network to which it belongs. In this paper we analysis that when MAC address is unique for all machines although we are using IP address for networking purpose. We studied and analyzed various attributes related to IP address scheme and MAC address. A detailed review study is discussed in this paper. Keywords: Internet Protocol (IP), IPv4, IPv6, Mask, Classless Addressing, Classful Addressing, Subnet Mask, Default gateway. 1. INTRODUCTION IP was first developed in the early 1980s. Its intent was to interconnect few nodes and was never expected to grow to the size of the Internet has become today. IPv4 was initially designed for best-effort service and only scaled to today s Internet size because of its state-less design. In the early 1990s, it became pretty evident that if the Internet will continue to grow at the exponential rate of doubling every eighteen months, the IPv4 address space would be depleted by the turn of the millennium. However work began on a new Internet Protocol, which was first called IPnG from IP Next Generation, but later became known as IPv6. The most evident reason for a new version of an IP was to increase the address space. Even in the most pessimistic scenario of inefficient allocation of addresses there would still be well over 1000 unique IP addresses per square meter of the earth. 2. IP addresses: Networks and hosts An IP address is a 32-bit number that uniquely identifies a host (computer or other device, such as a printer or router) on a TCP/IP network. IP addresses are normally expressed in dotted-decimal format, with four numbers separated by dotes, such as To understand how subnet masks are used to distinguish between hosts, networks, and subnetworks, examine an IP address in binary notation. For example, the dotted-decimal IP address is (in binary notation) the 32 bit number This number may be hard to make sense of, so divide it into four parts of eight binary digits. These eight bit sections are known as octets. The example IP address, then, becomes For a TCP/IP wide area network (WAN) to work efficiently as a collection of networks, the routers that pass packets of data between networks do not know the exact location of a host for which a packet of information is destined. Routers only know what network the host is a member of and use information stored in their route table to determine how to get the packet to the destination host's network. After the packet is delivered to the destination's network, the packet is delivered to the appropriate host. For this process to work, an IP address has two parts. The first part of an IP address is used as a network address, the last part as a host address.(fig:1) NET id Host Address Fig: 1 HOST id 2.1 Subnet mask The second item, which is required for TCP/IP to work, is the subnet mask. The subnet mask is used by the 474 P a g e

2 TCP/IP protocol to determine whether a host is on the local subnet or on a remote network. In TCP/IP, the parts of the IP address that are used as the network and host addresses are not fixed. This information is supplied in another 32-bit number called a subnet mask. In this example, the subnet mask is Applying a subnet mask to an IP address allows you to identify the network and node parts of the address. Performing a bitwise logical AND operation between the IP address and the subnet mask results in the Network Address or Number. For example, after applying logical AND b/w our test IP address and the default Class B subnet mask, we get: That indicates the Network address. Default subnet masks for: Class A (/8 CIDR) Class B (/16 CIDR) Class C (/24 CIDR) 2.2 Network classes Internet addresses are allocated by the InterNIC the organization that administers the Internet. These IP addresses are divided into classes. The most common of these are classes A, B, and C. Classes D and E exist, but are not used by end users. Each of the address classes has a different default subnet mask. You can identify the class of an IP address by looking at its first octet. Following are the ranges of Class A, B, and C Internet addresses, each with an example address: Class A networks use a default subnet mask of and have as their first octet. The address is a class A address. Its first octet is 10, which is between 1 and 126, inclusive. Class B networks use a default subnet mask of and have as their first octet. The address is a class B address. Its first octet is 172, which is between 128 and 191, inclusive. Class C networks use a default subnet mask of and have as their first octet. The address is a class C address. Its first octet is 192, which is between 192 and 223, inclusive. In some situations, the default subnet mask values do not fit the needs of the organization, because of the physical topology of the network, or because the numbers of networks (or hosts) do not fit within the default subnet mask restrictions. So network can be divided into subnet masks. 2.3 Subnetting A subnetwork, or subnet, is a logically visible subdivision of an IP network. The practice of dividing a single network into two or more networks is called subnetting and the networks created are called subnetworks or subnets. A Class A, B, or C TCP/IP network can be further divided, or subnetted, by a system administrator. A system administrator who is allocated a block of IP addresses may be administering networks that are not organized in a way that easily fits these addresses. For example, you have a wide area network with 150 hosts on three networks that are connected by a TCP/IP router. Each of these three networks has 50 hosts. You are allocated the class C network (For example.) This means that you can use the addresses to for your 150 hosts. Two addresses that cannot be used in this example are and because binary addresses with a host portion of all ones and all zeros are invalid. The zero address is invalid because it is used to specify a network without specifying a host. The 255 address (in binary notation, a host address of all ones) is used to broadcast a message to every host on a network. So these addresses are not assigned to any individual host. Instead of requesting more address blocks for each network, you divide your network into subnets that enable you to use one block of addresses on multiple physical networks. In this case, you divide your network into four subnets by using a subnet mask that makes the network address larger and the possible range of host addresses smaller. In other words, you are 'borrowing' some of the bits usually used for the host address, and using them for the network portion of the address. The subnet mask gives you four networks of 62 hosts each. This works because in binary notation, is the same as The first two digits of the last octet become network addresses, so you get the additional networks (0), (64), (128) and (192). (Some administrators will only use two of the subnetworks using as a subnet mask. (Fig: 2) In these four networks, the last 6 binary digits can be used for host addresses. 475 P a g e

3 Fig: Default gateways If a TCP/IP computer needs to communicate with a host on another network, it will usually communicate through a device called a router. In TCP/IP terms, a router that is specified on a host, which links the host's subnet to other networks, is called a default gateway. When a host attempts to communicate with another device using TCP/IP, it performs a comparison process using the defined subnet mask and the destination IP address versus the subnet mask and its own IP address. The result of this comparison tells the computer whether the destination is a local host or a remote host. If the result of this process determines the destination to be a local host, then the computer will simply send the packet on the local subnet. If the result of the comparison determines the destination to be a remote host, then the computer will forward the packet to the default gateway defined in its TCP/IP properties. It is then the responsibility of the router to forward the packet to the correct subnet. 3. MAC ADDRESS A Physical address or MAC address is a 12-digit hexadecimal numbers (48-bits) flat address burned into the ROM of the NIC card which is a Layer1 device of the OSI model. This is divided into 24-bit vendor code and 24-bit serial address. This is unique for each system and cannot be changed. In computing, a physical address, also real address, is the memory address that is represented in the form of a binary number on the address bus circuitry in order to enable the data bus to access a particular storage cell of main memory. A MAC address usually encodes the manufacturer's registered identification number. It may also be known as an Ethernet Hardware Address (EHA), hardware address, adapter address, or physical address. The MAC protocol encapsulates a SDU (payload data) by adding a 14 byte header (Protocol Control Information (PCI)) before the data and appending a 4-byte (32-bit) Cyclic Redundancy Check (CRC) after the data. The entire frame is preceded by a small idle period (the minimum inter-frame gap, 9.6 microseconds (μs)) and a 8 byte preamble (including the start of frame delimiter). Three numbering spaces, managed by the Institute of Electrical and Electronics Engineers (IEEE), are in common use for formulating a MAC address: MAC-48, EUI-48, and EUI-64. Where "EUI" stands for Extended Unique Identifier. 3.1 MAC Address Notations Ethernet hardware addresses are 48 bits, expressed as 12 hexadecimal digits (0-9, plus A-F, capitalized). These 12 hex digits consist of the first/left 6 digits (which should match the vendor of the Ethernet interface within the station) and the last/right 6 digits which specify the interface serial number for that interface vendor. The Standard (IEEE 802) format for printing MAC-48 addresses is six groups of two hexadecimal digits separated by hyphens (-) or colon (:) in transmission order e.g AB, AB. This form is also commonly used for EUI-64.Other convention use three groups of four hexadecimal digits separated by dots (.) e.g AB; again in transmission order. 3.2 MAC Address Representation The Original IEEE 802 MAC Address comes from the original Xerox Ethernet Addressing Scheme. The 48 bit Address space contains potentially 248 or 281,474,976,710,656 possible MAC address (Fig: 3). Fig: 3 Fig: 4 Address can either be universally administered address or locally administered address. A universally administered address is uniquely assigned to a device by its manufacturer these are sometimes also called burned 476 P a g e

4 in address (BIA). The First three octets identify the organization that issued the identifier (OUI) (Fig: 4). The following three octets are assigned by the organization in nearly any manner they please Subject to the constraint of uniqueness. The locally administered address is assigned by to a device by a networks administrator address do not contain OUIs. Universally administered and locally administered address are distinguishing by setting the second least significant bit of the most significant byte of the address. If the bit is 0 the address is universally admit if it is of the address is locally administered. 4. TECHNOLOGY AND WORKING MECHANISM OF IPV4 The Internet protocol version 4 (IPv4) is the delivery mechanism used by the TCP/IP protocols. IPv4 is an unreliable and connectionless datagram protocol a best-effort delivery service. The term best-effort means that IPv4 provides no error control or flow control. IPv4 assumes the unreliability of the underlying layers and does its best to get a transmission through to its destination, but with no guarantees. If reliability is important, IPv4 must be paired with a reliable protocol such as TCP. IPv4 is also a connectionless protocol for a packetswitching network that uses the datagram approach. This means that each datagram is handled independently, and each datagram can follow a different route to the destination. This implies that datagrams sent by the same source to the same destination could arrive out of order. Also, some could be lost or corrupted during transmission. 4.1 Packet Structure, Header & Version An IP packet consists of a header section and a data section. Packet is called datagrams. It is customary to show the header in 4-byte sections. The IPv4 packet header consists of 13 fields, of which 12 are required. The 13th field is optional (red background in table) and aptly named: options. The fields in the header are packed with the most significant byte first (big endian) and for the diagram and discussion, the most significant bits are considered to come first. The most significant bit is numbered 0, so the version field is actually found in the four most significant bits of the first byte. The first header field in an IP packet is the four-bit version field. 4.2 IPv4 Addresses IPv4 uses 32-bit (four-byte) addresses, which limits the address space to 4,294,967,296 (2 32 ) possible unique addresses. However, some are reserved for special purposes such as private networks (~18 million addresses) or multicast addresses (~270 million addresses). As addresses are being incrementally delegated to end users, an IPv4 address shortage has been developing, however network addressing architecture redesign via classful network design, Classless Inter-Domain Routing, and network address translation (NAT) has significantly delayed the inevitable exhaustion. IPv4 addresses are usually represented in dot-decimal notation (four numbers, each ranging from 0 to 255, separated by dots, e.g ). Each part represents 8 bits of the address, and is therefore called an octet. 4.3 Classful & Classless IP addressing IPv4 addressing at its inception used the concept of classes. This architecture is called classful addressing. Although this scheme is becoming obsolete, we briefly discuss it here to show the rational behind classless addressing. In classful addressing, the space is divided into five classes: A, B, C, D, and E. Each class occupies some part of the address space. To overcome address depletion and give more organizations access to the Internet classless addressing was designed and implemented. The different schemes of classless addressing are briefly described below. Around 1987 Variable Length Subnet mask (VLSM) was introduced. VLSM is used to implement subnets of different sizes. This allows efficient use of subnets and avoids wasting IP addresses. An address in CIDR notation is written with a suffix indicating the number of bits in the prefix, such as /16, where /16 is the suffix, and is the prefix. 4.4 Mask Although the length of the netid and hostid (in bits) is predetermined in classful addressing. We can also use a mask (also called the default mask) a 32-bit number made of contiguous 1s followed by contiguous 0s. The mask can help us to find the netid and the hostid. For example, the mask for a class A address has eight 1s, which means the first 8 bit of any address in class A define the net id; the next 24 bits defined the hostid. And the complete address is specify to the host address. 4.5 Applications In the IPv4 mobile network and via the IPv4 mobile LAN any application can be run. A Web-based application will be utilized that take real time GPS data and sends it to a site on the Internet. A Web-based application will be utilized to show real-time flight weather and other information useful to the aeronautics community, government organizations, and the military. Instant Messaging is a nice application to run as it is readily available and used very little bandwidth. 477 P a g e

5 4.6 IPv4 Limitations The first limit of IPv4 lies in the exhaustion of available public IPv4 addresses. The development of such mobile and home services will lead to a more rapid consumption of IPv4 addresses even if ISPs assign only one static public IP address to each home network. The customers will more and more use permanent connections, based on digital subscriber line (DSL) or 3G accesses. In practice, for all IP devices in mobile and home network to be addressable from outside, the network will need a lot of public IP addresses. 5. TECHNOLOGY AND WORKING MECHANISM OF IPV6 The IPv6 packet is composed of a mandatory base header followed by the payload. The payload consists of two parts: optional extension headers and data from an upper layer. The base header occupies 40 bytes, whereas the extension headers and data from the upper layer contain up to 65,535 bytes of information. 5.1 IPV6 ADDRESS AND STRUCTURE An IPv6 address is 128 bit (16 byte) value, with a logical structure, which can be assigned on a network interface, making the host reachable over IPv6 on that interface on that address. An IPv6 address can be assigned on an interface that has an IPv4 address assigned also. IPv6 addresses are part of the IPv6 header where they indicate origin and destination of the IPv6 datagram. Source IPv6 addresses are always unicast addresses, uniquely identifying the originating interface. Destination IPv6 addresses are unicast, anycast, or multicast addresses. Addresses are 128 bits long and have several distinct structural definitions, except for the loopback address and the "unspecified" address, which have no specific structure. Unicast addresses are typically composed of two logical parts: a 64-bit (sub) network prefix used for routing, and a 64-bit host part used to identify a host within the network. A network prefix consists of an ISP-assigned value in the most significant 48 bits of the address. This value can be self-assigned in case of a unique local address. The 16 bits of the subnet field are available to the network administrator to define subnets within the given network. The 64-bits interface identifier is automatically generated from the interface's MAC address (using modified EUI-64 format), obtained from a DHCPv6 server, or assigned manually. 5.2 Notation Single addresses can be written as eight groups of four hexadecimal digits (each group representing 16 bits, or two octets), and each group is separated by a colon (:). For e.g.: 3001:0db8:85a3:0000:0000:8a2e:0370:7334. Leading zeroes in a group may be omitted (but at least one digit per group must be left). The address above could be written as: 3001:db8:85a3:0:0:8a2e:370:7334. A string of consecutive all-zero groups may be replaced by two colons. In order to avoid ambiguity, this simplification may only be applied once. The address above would typically be written as: 3001:db8:85a3::8a2e:370:7334. The localhost (loopback) address (0:0:0:0:0:0:0:1) and the IPv6 undetermined address (0:0:0:0:0:0:0:0) can thus be reduced to:: 1 and :: respectively 5.3 Unspecified address There are a number of addresses with special meaning in IPv6: Unspecified address: ::/128 the address with all zero bits is called the unspecified address (In IPv4 it can be represented as ). Default Route: ::/0 is the default unicast route address (corresponding to with netmask in IPv4). Local addresses: ::1/128 the loopback address is a unicast localhost address. fe80::/10 Addresses in the link-local prefix are only valid on a single link. Unique local addresses fc00::/7 Unique local addresses (ULA's) are intended for local communication. 5.4 Applications With the development of IPv6 the application areas are growing. It will be possible for many handheld and mobile devices to be connected. Some examples of IPv6 application are: Multi-user network games, Ad-hoc networking, Collaborative working, Home networking, Peer-to-Peer networking, Ambient Intelligence, Medical Applications, In-Car Communications. 5.5 Advantages The IPv6 has some advantages over IPv4 that can be summarized as follows: The main advantage of IPv6 over IPv4 is address space. It was design to support +340 undecillion IP addresses compared with 4.3 billion IPv4 addresses. This is the main reason why we should migrate to IPv6 rather than maintaining IPv4 that will be exhausted. The IPv6 specification mandates that IPv6- enabled nodes must support the IP Security Protocol (IPSec), therefore IPv6 nodes more secure than IPv4 nodes. It is also includes security features, such as payload encryption and authentication of the source of the communication, in its specifications. Enhance QoS support to provide better support for real-time traffic (e.g. Voice over IP). IPv6 includes labeled flows in its specifications. 478 P a g e

6 5.6 Disadvantages Ipv6 has no such disadvantages. The only disadvantage is that its network bit is quite longer. This gives rise to complexity and hinders the clear understanding of its technology. For this reason spreading of IPv6 is being slow. 6. COMPARISON BETWEEN IPV4 AND IPV6 Address features is the main changes between IPv4 and IPv6. 128bits addressing space in IPv6 was built to overcome the address space shortage in IPv4. From this table (Table: 1) we are showing some differences between IPv4 and IPv6 - Features IPv4 IPv6 No of Addresses 32 bits 128 bits Checksum in Included No checksum header Header includes options Required Moved to IPv6 extension headers Quality of Services (QoS) Differentiated Services Use traffic classes & flow labels IPSec support Optional Required IP configuration Manually or DHCP Autoconfiguration or Address Resolution Protocol (ARP) IGMP Mobility Domain Name System Use to resolve an IPv4 address Use to manage local subnet group Use Mobile IPv4 (MIPv4) Use host address (A) resource DHCP Replaced by Neighbor Discovery Replaced with Multicast Listener Discovery (MLD) MIPv6 with faster handover, routing Use host address (AAAA) resource records records Table: 1 7. CONCLUSION MAC address is the basis on which communication occurs. However we need IP address to be able to create a routing table, which enables faster communication. Lots of communication algorithms take use of IP addresses (Network address +Subnet masks) to be able to route packages faster. We need IP address because when we work on LAN we can communicate without IP address with the help of NETBIOS and WINS but in WAN we work on network layer and data frame becomes packet and packet need IP address for routing. IP address (network address) is just use for transferring information from one network to another. Travelling of information among networks uses IP addresses. While Mac addresses (physical addresses) are actually uses for distribution of information in following ways: 1) Carring of information from one network to another. 2) Distribution of information (resources) is based upon MAC address. For example:-network A, Network B and Network C are three networks. All networks are having 5 nodes (client). If network A s node 1 want to send information to node 3 for network B. Then: - 1) Information to the network is sent with the help of IP address of that network (Network B). IP addresses are unique on network layer. 2) Then it will send information to node 3 of network B with the help of MAC address which is unique at layer 2(DLL). IP address (network address) is just used for transferring information from one network to another network. Travelling of information among networks uses IP addresses. It is used to identify the network and host. A MAC address (physical addresses) is used for distribution of information within the network segment. The Ethernet uses MAC address to transfer data between hosts. When it is used with IP network, the IP address is resolved using ARP protocol to find the MAC address of the end device and the data is transmitted. Port numbers are used by the TCP/UDP protocol to isolate the traffic which is multiplexed and sent by the user application. For example, the user device can open multiple applications at the same time like, multiple web browsers, and FTP. To identify the data individually the port number are used. 479 P a g e

7 Umang Garg, Pushpneel Verma, Yudhveer Singh Moudgil, Sanjeev Sharma / International Journal of REFERENCES [1] Y. Rekhter, R. Moskowitz, D. Karrenberg, G. de Groot, E. Lear,, "Address Allocation for Private Internets", 02/29/1996. (Pages=9) (Obsoletes RFC1627). [2] L.Venkatraman, D.P. Agrawal: A novel authentication in ad hoc networks. In Proceedings of the second IEEE Wireless Communications and Networking Conference, Chicago, September 2009 [3] Mousam Dagar,Priyanka Sangwan Spoofing Media Access Control (MAC) & Its Counter Measures IJMAN 2011, [4] Comperative study of IPv4 and IPv6 by Rashed Mazumder, Mohammad Badrul Alam Miah, Md. Ahsan Habib from IJMAN page no. 334 to 337. [5] Forouzan, B. A., 2006: Data Communications and Networking, McGraw- Hill Forouzan Networking Series. [6] IPv6 Ready Logo Program Website, 2009: [7] IPv6_Wikipedia, 2010: IPv6, [8] IPv4_Wikipedia, 2010: P a g e

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

Chapter 19 Network Layer: Logical Addressing 19.1

Chapter 19 Network Layer: Logical Addressing 19.1 Chapter 19 Network Layer: Logical Addressing 19.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 19-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address that

More information

Internet Protocols. Addressing & Services. Updated: 9-29-2012

Internet Protocols. Addressing & Services. Updated: 9-29-2012 Internet Protocols Addressing & Services Updated: 9-29-2012 Virtual vs. Physical Networks MAC is the part of the underlying network MAC is used on the LAN What is the addressing mechanism in WAN? WAN is

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

Lab#2: IP Addressing and Subnetting

Lab#2: IP Addressing and Subnetting IP Addressing Lab#2: IP Addressing and Subnetting Each Network Interface Card (NIC or Network card) present in a PC is assigned one Network address called as IP address. This IP address is assigned by

More information

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University Computer Networks Introduc)on to Naming, Addressing, and Rou)ng Week 09 College of Information Science and Engineering Ritsumeikan University MAC Addresses l MAC address is intended to be a unique identifier

More information

PART IV. Network Layer

PART IV. Network Layer PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must

More information

IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing

IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing IP Addressing -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing Internetworking The concept of internetworking: we need to make different networks communicate

More information

IP Addressing A Simplified Tutorial

IP Addressing A Simplified Tutorial Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to

More information

Internetworking and IP Address

Internetworking and IP Address Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address

More information

CE363 Data Communications & Networking. Chapter 6 Network Layer: Logical Addressing

CE363 Data Communications & Networking. Chapter 6 Network Layer: Logical Addressing CE363 Data Communications & Networking Chapter 6 Network Layer: Logical Addressing TCP/IP and OSI model APPLICATION APPLICATION PRESENTATION SESSION TRANSPORT NETWORK Host-Network TRANSPORT NETWORK DATA

More information

8.2 The Internet Protocol

8.2 The Internet Protocol TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

IP Addressing Introductory material.

IP Addressing Introductory material. IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport

More information

IPv6 Addressing. Awareness Objective. IPv6 Address Format & Basic Rules. Understanding the IPv6 Address Components

IPv6 Addressing. Awareness Objective. IPv6 Address Format & Basic Rules. Understanding the IPv6 Address Components IPv6 Addressing Awareness Objective IPv6 Address Format & Basic Rules Understanding the IPv6 Address Components Understanding & Identifying Various Types of IPv6 Addresses 1 IPv4 Address SYNTAX W. X.

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Internet Protocol version 4 Part I

Internet Protocol version 4 Part I Internet Protocol version 4 Part I Claudio Cicconetti International Master on Information Technology International Master on Communication Networks Engineering Table of Contents

More information

TCP/IP Basis. OSI Model

TCP/IP Basis. OSI Model TCP/IP Basis 高 雄 大 學 資 訊 工 程 學 系 嚴 力 行 Source OSI Model Destination Application Presentation Session Transport Network Data-Link Physical ENCAPSULATION DATA SEGMENT PACKET FRAME BITS 0101010101010101010

More information

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA) Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

More information

Internet Protocol Address

Internet Protocol Address SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give

More information

Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)

Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP) Tik-110.350 Computer Networks (3 cr) Spring 2000 Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP) Professor Arto Karila Helsinki University of Technology E-mail: [email protected]

More information

Future Internet Technologies

Future Internet Technologies Future Internet Technologies Traditional Internet Dr. Dennis Pfisterer Institut für Telematik, Universität zu Lübeck http://www.itm.uni-luebeck.de/people/pfisterer Internet Protocol v4 (IPv4) IPv4 Model

More information

IP Subnetting. Subnetting

IP Subnetting. Subnetting IP Subnetting Shailesh N. Sisat Prajkta S. Bhopale Vishwajit K. Barbudhe Abstract - Network management becomes more and more important as computer-networks grow steadily. A critical skill for any network

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved. IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

Savera Tanwir. Internet Protocol

Savera Tanwir. Internet Protocol Savera Tanwir Internet Protocol The IP Protocol The IPv4 (Internet Protocol) header. IP Packet Details Header and payload Header itself has a fixed part and variable part Version IPv4, IPv5 or IPv6 IHL,

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

IP Addressing. IP Addresses. Introductory material.

IP Addressing. IP Addresses. Introductory material. IP Addressing Introductory material. An entire module devoted to IP addresses. IP Addresses Structure of an IP address Classful IP addresses Limitations and problems with classful IP addresses Subnetting

More information

Internet Addresses (You should read Chapter 4 in Forouzan)

Internet Addresses (You should read Chapter 4 in Forouzan) Internet Addresses (You should read Chapter 4 in Forouzan) IP Address is 32 Bits Long Conceptually the address is the pair (NETID, HOSTID) Addresses are assigned by the internet company for assignment

More information

(Refer Slide Time: 02:17)

(Refer Slide Time: 02:17) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,

More information

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

2. IP Networks, IP Hosts and IP Ports

2. IP Networks, IP Hosts and IP Ports 1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3

More information

Classful IP Addressing (cont.)

Classful IP Addressing (cont.) Classful IP Addressing (cont.) 1 Address Prefix aka Net ID defines the network Address Suffix aka Host ID defines the node In Classful addressing, prefix is of fixed length (1, 2, or 3 bytes)! Classful

More information

WHITE PAPER. Understanding IP Addressing: Everything You Ever Wanted To Know

WHITE PAPER. Understanding IP Addressing: Everything You Ever Wanted To Know WHITE PAPER Understanding IP Addressing: Everything You Ever Wanted To Know Understanding IP Addressing: Everything You Ever Wanted To Know CONTENTS Internet Scaling Problems 1 Classful IP Addressing 3

More information

CCNA Tutorial Series SUBNETTING

CCNA Tutorial Series SUBNETTING CCNA Tutorial Series This document contains the Course Map For The Interactive flash tutorial at: http://www.semsim.com/ccna/tutorial/subnetting/subnetting.html HOME PAGE Course Objectives Pre-test By

More information

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas IPv6 Fundamentals Chapter 1: Introduction ti to IPv6 Copyright Cisco Academy Yannis Xydas The Network Today The Internet of today is much different that it was 30, 15 or 5 years ago. 2 Technology Tomorrow

More information

ICS 351: Today's plan

ICS 351: Today's plan ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6

More information

Module 2: Assigning IP Addresses in a Multiple Subnet Network

Module 2: Assigning IP Addresses in a Multiple Subnet Network Module 2: Assigning IP Addresses in a Multiple Subnet Network Contents Overview 1 Lesson: Assigning IP Addresses 2 Lesson: Creating a Subnet 19 Lesson: Using IP Routing Tables 29 Lesson: Overcoming Limitations

More information

2.1.2.2.2 Variable length subnetting

2.1.2.2.2 Variable length subnetting 2.1.2.2.2 Variable length subnetting Variable length subnetting or variable length subnet masks (VLSM) allocated subnets within the same network can use different subnet masks. Advantage: conserves the

More information

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine [email protected] http://www.ics.uci.

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci. Chapter 3: Review of Important Networking Concepts Magda El Zarki Dept. of CS UC Irvine [email protected] http://www.ics.uci.edu/~magda 1 Networking Concepts Protocol Architecture Protocol Layers Encapsulation

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

Neighbour Discovery in IPv6

Neighbour Discovery in IPv6 Neighbour Discovery in IPv6 Andrew Hines Topic No: 17 Email: [email protected] Organiser: Christian Schindelhauer University of Paderborn Immatriculation No: 6225220 August 4, 2004 1 Abstract

More information

Internetworking and Internet-1. Global Addresses

Internetworking and Internet-1. Global Addresses Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties

More information

Guide to TCP/IP, Third Edition. Chapter 2: IP Addressing and Related Topics

Guide to TCP/IP, Third Edition. Chapter 2: IP Addressing and Related Topics Guide to TCP/IP, Third Edition Chapter 2: IP Addressing and Related Topics Objectives Understand IP addressing, anatomy and structures, and addresses from a computer s point of view Recognize and describe

More information

Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0)

Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0) for connecting to a BIM Server GRAPHISOFT 2009 (version 1.0) Basic Vocabulary...3 Local Area Networks...5 Examples of Local Area Networks...5 Example 1: LAN of two computers without any other network devices...5

More information

- IPv4 Addressing and Subnetting -

- IPv4 Addressing and Subnetting - 1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI

More information

Interconnecting Cisco Network Devices 1 Course, Class Outline

Interconnecting Cisco Network Devices 1 Course, Class Outline www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course

More information

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1 Efficient Addressing Outline Addressing Subnetting Supernetting CS 640 1 IPV4 Global Addresses Properties IPv4 uses 32 bit address space globally unique hierarchical: network + host 7 24 Dot Notation 10.3.2.4

More information

256 4 = 4,294,967,296 ten billion. 256 16 = 18,446,744,073,709,551,616 ten quintillion. IP Addressing. IPv4 Address Classes

256 4 = 4,294,967,296 ten billion. 256 16 = 18,446,744,073,709,551,616 ten quintillion. IP Addressing. IPv4 Address Classes IP Addressing With the exception of multicast addresses, Internet addresses consist of a network portion and a host portion. The network portion identifies a logical network to which the address refers,

More information

Lecture 8. IP Fundamentals

Lecture 8. IP Fundamentals Lecture 8. Internet Network Layer: IP Fundamentals Outline Layer 3 functionalities Internet Protocol (IP) characteristics IP packet (first look) IP addresses Routing tables: how to use ARP Layer 3 functionalities

More information

Chapter 5. IPv4 Addresses. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 5. IPv4 Addresses. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 5 IPv4 Addresses TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Outline TCP/IP Protocol Suite 2 5-1 INTRODUCTION The

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 7: Network Layer in the Internet Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall,

More information

Advanced IP Addressing

Advanced IP Addressing Advanced IP Addressing CS-765 A Aspects Of Systems Administration Spring-2005 Instructure: Jan Schauman Stevens Institute Of Technology, NJ. Prepared By: Modh, Jay A. M.S. NIS SID: 999-14-0352 Date: 05/02/2005

More information

IPv6 Advantages. www.compaq.com. Yanick Pouffary. [email protected]

IPv6 Advantages. www.compaq.com. Yanick Pouffary. Yanick.Pouffary@compaq.com IPv6 Advantages Yanick Pouffary [email protected] IPv6 FORUM A world-wide consortium of leading Internet vendors and Research and Education Networks The IPv6 FORUM mission To promote IPv6 in order

More information

One of the most important topics in any discussion of TCP/IP is IP. IP Addressing

One of the most important topics in any discussion of TCP/IP is IP. IP Addressing IP Addressing 125 machine, called a RARP server, responds with the answer, and the identity crisis is over. RARP uses the information it does know about the machine s MAC address to learn its IP address

More information

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31 IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011

More information

21.4 Network Address Translation (NAT) 21.4.1 NAT concept

21.4 Network Address Translation (NAT) 21.4.1 NAT concept 21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially

More information

IPv6 in Axis Video Products

IPv6 in Axis Video Products TECHNICAL NOTE REFERENCE DOCUMENT IPv6 in Axis Video Products Created: 2006-01-31 Last updated: 2006-05-29 TABLE OF CONTENTS DOCUMENT HISTORY... 2 1 IPV6 IN GENERAL... 3 1.1 The IPv6 address... 3 1.1.1

More information

Computer Network Foundation. Chun-Jen (James) Chung. Arizona State University

Computer Network Foundation. Chun-Jen (James) Chung. Arizona State University Computer Network Foundation Chun-Jen (James) Chung 1 Outline Network Addressing Subnetting Classless Inter-Domain Routing (CIDR) Route Aggregation Network Addressing How does the network decide where to

More information

ProCurve Networking IPv6 The Next Generation of Networking

ProCurve Networking IPv6 The Next Generation of Networking ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...

More information

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking

More information

Tutorial (03) IP addresses & Sub netting

Tutorial (03) IP addresses & Sub netting Tutorial (03) IP addresses & Sub netting Dr. Ahmed M. ElShafee ١ Agenda IP Addressing Conventions Original IPv4 Address Classes Subnetting CIDR (Classless InterDomain Routing) ٢ IP Addressing Conventions

More information

Scaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1

Scaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1 Scaling the Network: Subnetting and Other Protocols Networking CS 3470, Section 1 Today CIDR Subnetting Private IP addresses ICMP, IMAP, and DHCP Protocols 2 Packet Encapsulation ** Creative Commons: http://en.wikipedia.org/wiki/file:udp_encapsulation.svg

More information

Expert Reference Series of White Papers. Basics of IP Address Subnetting

Expert Reference Series of White Papers. Basics of IP Address Subnetting Expert Reference Series of White Papers Basics of IP Address Subnetting 1-800-COURSES www.globalknowledge.com Basics of IP Address Subnetting Norbert Gregorio, Global Knowledge Instructor Introduction

More information

IP Networking Part 3- IP Address Management A webinar to help you prepare for the CBNE Certification

IP Networking Part 3- IP Address Management A webinar to help you prepare for the CBNE Certification IP Networking Part 3- IP Address Management A webinar to help you prepare for the CBNE Certification Wayne M. Pecena, CPBE, CBNE Texas A&M Information Technology Educational Broadcast Services IP Networking,

More information

Introduction to Network Security Lab 1 - Wireshark

Introduction to Network Security Lab 1 - Wireshark Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication

More information

Network and Host Addresses 1.3. 2003, Cisco Systems, Inc. All rights reserved. INTRO v1.0a 6-4

Network and Host Addresses 1.3. 2003, Cisco Systems, Inc. All rights reserved. INTRO v1.0a 6-4 IP Addressing To facilitate the routing of packets over a network, the TCP/IP protocol suite uses a 32-bit logical address known as an IP address. This topic introduces the components of an IP address.

More information

04 Internet Protocol (IP)

04 Internet Protocol (IP) SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery

More information

Chapter 2 TCP/IP Networking Basics

Chapter 2 TCP/IP Networking Basics Chapter 2 TCP/IP Networking Basics A network in your home or small business uses the same type of TCP/IP networking that is used for the Internet. This manual provides an overview of IP (Internet Protocol)

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation

More information

TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories:

TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories: Due to the number of hardware possibilities for a network, there must be a set of rules for how data should be transmitted across the connection media. A protocol defines how the network devices and computers

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Are You Ready to Teach IPv6?

Are You Ready to Teach IPv6? Are You Ready to Teach IPv6? William Saichek Orange Coast College Karl Dietrich Lansing Community College Giving Credit Where Credit is Due The slides, data and projects in this presentation were used,

More information

IPv6 Fundamentals: A Straightforward Approach

IPv6 Fundamentals: A Straightforward Approach IPv6 Fundamentals: A Straightforward Approach to Understanding IPv6 Rick Graziani Cisco Press 800 East 96th Street Indianapolis, IN 46240 IPv6 Fundamentals Contents Introduction xvi Part I: Background

More information

Chapter 9. IP Secure

Chapter 9. IP Secure Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

IP Subnetting and Addressing

IP Subnetting and Addressing Indian Institute of Technology Kharagpur IP Subnetting and Addressing Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 6: IP Subnetting and Addressing

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

IP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface

IP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface IP addressing IP address: 32-bit identifier for host, router interface Interface: Connection between host, router and physical link routers typically have multiple interfaces host may have multiple interfaces

More information

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples. About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described

More information

Internet Protocol Version 6 (IPv6)

Internet Protocol Version 6 (IPv6) Internet Protocol Version 6 (IPv6) Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 14-1 Overview

More information

Types of IPv4 addresses in Internet

Types of IPv4 addresses in Internet Types of IPv4 addresses in Internet PA (Provider Aggregatable): Blocks of addresses that may be sub-assigned to other ISPs or to other companies that also may leased the addresses to their customers May

More information

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners

More information

Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming ------ IP routing

Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming ------ IP routing Process Process Process Layer CSCE 515: Computer Network Programming ------ IP routing Wenyuan Xu ICMP, AP & AP TCP IP UDP Transport Layer Network Layer Department of Computer Science and Engineering University

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry

More information

Introduction to IPv6 and Benefits of IPv6

Introduction to IPv6 and Benefits of IPv6 Introduction to IPv6 and Benefits of IPv6 Ammar Yasir Korkusuz 2012 Bogazici University, Electrical-Electronics Engineering Department MSc. Student EE 545 TERM PROJECT Abstract: IPv6 is a new internet

More information

Can PowerConnect Switches Be Used in IP Multicast Networks?

Can PowerConnect Switches Be Used in IP Multicast Networks? PowerConnect Application Note #6 January 2004 Can PowerConnect Switches Be Used in IP Multicast Networks? This Application Note relates to the following Dell PowerConnect products: PowerConnect 33xx PowerConnect

More information

CS 348: Computer Networks. - IP addressing; 21 st Aug 2012. Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - IP addressing; 21 st Aug 2012. Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - IP addressing; 21 st Aug 2012 Instructor: Sridhar Iyer IIT Bombay Think-Pair-Share: IP addressing What is the need for IP addresses? Why not have only MAC addresses? Given that

More information

Type of addressing in IPv4

Type of addressing in IPv4 Type of addressing in IPv4 Within the address range of each IPv4 network, we have three types of addresses: Network address - The address by which we refer to the network Broadcast address - A special

More information

hp ProLiant network adapter teaming

hp ProLiant network adapter teaming hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2

More information

ERserver. iseries. Networking TCP/IP setup

ERserver. iseries. Networking TCP/IP setup ERserver iseries Networking TCP/IP setup ERserver iseries Networking TCP/IP setup Copyright International Business Machines Corporation 1998, 2002. All rights reserved. US Government Users Restricted

More information

Lab 10.4.1 IP Addressing Overview

Lab 10.4.1 IP Addressing Overview Lab 10.4.1 IP ing Overview Estimated time: 30 min. Objectives: Background: This lab will focus on your ability to accomplish the following tasks: Name the five different classes of IP addresses Describe

More information

Desirable Properties Of An Internet Addressing Scheme

Desirable Properties Of An Internet Addressing Scheme Desirable Properties Of An Internet Addressing Scheme Compact Universal Works with all network hardware Supports efficient decision making - Test whether a destination can be reached directly - Decide

More information

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required

More information